Movatterモバイル変換


[0]ホーム

URL:


US6128731A - Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility - Google Patents

Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility
Download PDF

Info

Publication number
US6128731A
US6128731AUS09/176,696US17669698AUS6128731AUS 6128731 AUS6128731 AUS 6128731AUS 17669698 AUS17669698 AUS 17669698AUS 6128731 AUS6128731 AUS 6128731A
Authority
US
United States
Prior art keywords
computer system
bios
firmware
expansion device
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/176,696
Inventor
Saeed S. Zarrin
John Sully
Daniel Brown
Edward E. Wilcox
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Morgan Stanley and Co LLC
Hewlett Packard Enterprise Development LP
Original Assignee
Silicon Graphics Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silicon Graphics IncfiledCriticalSilicon Graphics Inc
Priority to US09/176,696priorityCriticalpatent/US6128731A/en
Assigned to SILICON GRAPHICS, INC.reassignmentSILICON GRAPHICS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WILCOX, EDWARD E., BROWN, DANIEL, SULLY, JOHN, ZARRIN, SAEED S.
Application grantedgrantedCritical
Publication of US6128731ApublicationCriticalpatent/US6128731A/en
Assigned to FOOTHILL CAPITAL CORPORATIONreassignmentFOOTHILL CAPITAL CORPORATIONSECURITY AGREEMENTAssignors: SILICON GRAPHICS, INC.
Assigned to U.S. BANK NATIONAL ASSOCIATION, AS TRUSTEEreassignmentU.S. BANK NATIONAL ASSOCIATION, AS TRUSTEESECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS, INC.
Assigned to GENERAL ELECTRIC CAPITAL CORPORATIONreassignmentGENERAL ELECTRIC CAPITAL CORPORATIONSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS, INC.
Assigned to MORGAN STANLEY & CO., INCORPORATEDreassignmentMORGAN STANLEY & CO., INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: GENERAL ELECTRIC CAPITAL CORPORATION
Assigned to SILICON GRAPHICS INTERNATIONAL, CORP.reassignmentSILICON GRAPHICS INTERNATIONAL, CORP.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SGI INTERNATIONAL, INC., SILICON GRAPHICS, INC. ET AL.
Assigned to SILICON GRAPHICS INTERNATIONAL CORP.reassignmentSILICON GRAPHICS INTERNATIONAL CORP.MERGER (SEE DOCUMENT FOR DETAILS).Assignors: SGI INTERNATIONAL, INC.
Assigned to SILICON GRAPHICS INTERNATIONAL, INC.reassignmentSILICON GRAPHICS INTERNATIONAL, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS, INC.
Assigned to SGI INTERNATIONAL, INC.reassignmentSGI INTERNATIONAL, INC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS INTERNATIONAL, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS INTERNATIONAL CORP.
Assigned to SILICON GRAPHICS, INC.reassignmentSILICON GRAPHICS, INC.ORDER...AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, ENCUMBRANCES, AND INTERESTS.Assignors: MORGAN STANLEY & CO., INCORPORATED
Assigned to SILICON GRAPHICS, INC.reassignmentSILICON GRAPHICS, INC.ORDER...AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, ENCUMBRANCES, AND INTERESTS.Assignors: FOOTHILL CAPITAL CORPORATION
Assigned to SILICON GRAPHICS, INCreassignmentSILICON GRAPHICS, INCORDER. . .AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, CLAIMS, ENCUMBRANCES, AND INTERESTSAssignors: U.S. BANK NATIONAL ASSOCIATION, AS TRUSTEE
Assigned to SILICON GRAPHICS INTERNATIONAL CORP.reassignmentSILICON GRAPHICS INTERNATIONAL CORP.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: MORGAN STANLEY SENIOR FUNDING, INC., AS AGENT
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPreassignmentHEWLETT PACKARD ENTERPRISE DEVELOPMENT LPASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SILICON GRAPHICS INTERNATIONAL CORP.
Anticipated expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An ×86 based computer system that implements a firmware based boot process without an ×86 BIOS that supports expansion devices coupled to the computer system, wherein the expansion devices include their own respective BIOS extensions. The computer system includes an ×86 processor coupled to a volatile memory and a non-volatile memory via a bus. The non-volatile memory includes firmware which when executed by the processor cause the computer system to implement the boot process. The firmware initializes device drivers for the computer system and initializes an application programming interface for the device drivers. The firmware then initializes a compatibility component for interfacing with the device drivers, wherein the compatibility component is operable for translating accesses by a first software application to an ×86 BIOS into corresponding accesses to the device drivers. This enables the first software application to execute on the computer system by using the compatibility component while a second software application is able to execute on the computer system by accessing the application programming interface directly. The firmware then runs an expansion device BIOS extension from an expansion device coupled to the computer system to initialize a memory area in volatile memory. The memory area is configured by the BIOS extension to interface with the expansion device, such that the expansion device is made available to the first application and the second application.

Description

FIELD OF THE INVENTION
The field of the present invention pertains to the initialization functions and routines of ×86 computer systems. More particularly, the present invention pertains to a method and a system for initializing ×86 computer systems by using advanced firmware.
BACKGROUND OF THE INVENTION
The "IBM-compatible" computer system is well known and is widely used in many different areas of business, industry, government, and the home. More than 90 percent of the personal computer systems sold by the industry today are IBM-compatible. The vast majority of software programs written for personal computer systems are designed to function with the standard, IBM-compatible, ×86 computer system. Each IBM-compatible computer system is substantially the same with regard to its basics functions as the original IBM PC AT (sometimes referred to as PS/2) computer system introduced in 1984.
The IBM PC AT computer (hereinafter referred to as the IBM PC) was built upon what became known as the industry standard architecture. This architecture is based upon various attributes of the IBM PC computer system. As is well known, the original IBM PC was based upon an Intel ×86 microprocessor (e.g., the Intel 80286) and ran software written to the Intel ×86 instruction set. The architecture of the IBM PC was comprised of various discrete hardware components (e.g., such as interrupt controller chips, input output controller chips, and the like) and basic functional software, or boot software, stored in non-volatile memory chips.
The most basic operations of the IBM PC were controlled by this basic functional software component stored in a ROM chip, referred to as basic input output system software, or "BIOS". When the computer system is initially powered on, the BIOS software is the executed from non-volatile memory and initializes the various discrete hardware components to place the computer system into a state of readiness, wherein the system is able to subsequently execute software from a coupled mass storage device (e.g., a floppy disk, a hard drive, etc.). Each of these attributes comprise portions of the IBM PC compatible architecture and define what it means to be "IBM-compatible". Software programmers and hardware device designers became intimately familiar with these attributes of the IBM PC and the IBM PC compatible architecture. There software programs and hardware devices are designed to access the innermost data structures, addresses, I/O registers, and other such attributes. Thus, these attributes have become known as, essentially, the "IBM-compatible API", since software engineers/hardware designers write their various applications/hardware devices to directly access and/or utilize these attributes.
For example, to be software compatible, a software application must be able to run on an IBM PC. The software application must be able to interface with the specific addresses of certain discrete hardware components, specific input output register addresses, specific memory locations defined by the BIOS to perform certain functions, and the like, on the IBM PC. Each of these various attributes determine whether a software program is IBM-compatible or not.
With respect to IBM-compatible computer systems, to be hardware compatible, a computer system from a different manufacturer (e.g., Compaq) must be able to successfully run software applications written specifically for the IBM PC.. To be hardware compatible, a computer system must use the same specific addresses for the same specific functions, utilize the same input output registers at the same addresses, perform the same BIOS functions by accessing the identical memory locations, and the like.
Essentially, to be IBM-compatible, a manufacturer had to build its respective computer system using substantially the same hardware components and executing the same software for implementing its most basic functions, such as BIOS software, as the IBM PC. To use different hardware (e.g., interrupt controller's, memory controllers, bus interfaces, or the like), or to use different BIOS software meant risking hardware and/or software compatibility and risking the possibility of not being able to run IBM-compatible software applications or to use IBM-compatible hardware devices.
This had a practical effect of freezing the basic hardware and basic software of all IBM-compatible computer systems at the IBM PC level. To maintain compatibility with the large number of previously written software programs and previously designed hardware devices, commonly referred to as legacy programs and legacy hardware, each successive generation of computer systems remained substantially the same as the IBM PC. Thus, while the industry has progressed by several generations from the Intel 286 microprocessor used in the original IBM PC (e.g., the Pentium II, AMD K6, etc.) the most basic functionality of all IBM-compatible computer systems remains the same.
The problem with this situation is the fact that in order to remain compatible, computer manufacturers have had to retain this most basic functionality of the IBM PC, regardless of how out of date, or how unsuited to task, this basic functionality has become. Computer manufacturers have been unable to incorporate advances or improvements to this functionality without sacrificing compatibility with legacy programs and legacy hardware. As specific user applications have increased in sophistication, so to have demands for reliability, performance, and availability of the computer systems. These demands are becoming increasingly difficult to satisfy given the "primitive" state of the most basic functionality of IBM-compatible computer systems. Computer systems are now several orders of magnitude more capable and more sophisticated than the original IBM PC. However, the systems still must use the same BIOS software and boot through the same sequence of operations as the original IBM PC, or risk sacrificing compatibility with legacy programs and legacy hardware.
For example, it would be very desirable to build a modern computer system which incorporates modern firmware. Modern firmware uses up-to-date, current design practices to implement the most basic functions of a computer system. Modern firmware is designed to present very structured, standardized, APIs to applications running on the computer system. Such a modern computer system would take advantage of all the advances in computer system technology. Such a system would use state-of-the-art components and use state-of-the-art programming techniques. Such a modern computer system would provide a huge vantages in terms of its usability, its reliability, and its ability to incorporate much more modern subsystems (e.g., a modern graphics rendering pipe line, modern hardware peripheral interfaces, and the like).
The problem with this solution, however, is the fact that, as described above, the vast majority of preexisting software programs (e.g., word processors, spreadsheets, games, etc.) and hardware peripherals (e.g., software add on cards, serial port devices, parallel port devices, etc.) for personal computers are written to the specific attributes and APIs presented by IBM-compatible computer systems. In designing a computer system which boots from and operates with a modern firmware architecture, the IBM PC hardware and the associated IBM PC BIOS is abandoned. Without this "IBM-compatible API", virtually all the preexisting hardware peripherals and software applications cannot run. This is unacceptable to the average user.
One solution to this problem is software based emulation of the IBM PC. This involves translating the instructions from one format to another using a software emulation program, and executing the translated instructions on the host system, wherein the translated instructions are native instructions and execute natively. An example of such a program would be SoftWindows from Insignia, wherein the underlying hardware would be a RISC-based machine (e.g., a MIPS based computer system running Unix) and wherein SoftWindows translates instructions from an emulated application (e.g., a Windows application) into native instructions for execution on the MIPS based computer system. The problem with this solution is that it is too slow. Full software based emulation adds to much processing "overhead" to allow the emulated application to run efficiently.
Another solution would be to include hardware support for both a legacy IBM PC a new advanced firmware, wherein the computer system boots to an IBM-compatible mode when running legacy applications and boots to the advanced firmware when running applications designed to the APIs of the new firmware. The problem with this solution is that it wastes large amounts of resources with a machine having two separate and distinct personalities. It essentially combines the hardware of two computer systems, one modern and one old, into a single computer system. Such a dual personality system wastes hardware regardless of which mode it runs in.
Thus, what is needed is a system which provides the best of both worlds. What is required is a system which maintains IBM PC compatibility and yet provides the benefits of an advanced firmware architecture. What is needed is a system which is able to boot using advanced firmware architecture yet retains compatibility with legacy hardware and legacy software. What is needed is a system which provides the advances of the modern firmware designs while preserving the ability to accommodate the legacy hardware devices and run legacy software applications. The required system needs to be able to run both modern and legacy applications efficiently and quickly with a minimum amount of processing overhead. What is needed is a system which supports legacy applications/hardware without requiring the duplication of the IBM PC API hardware/BIOS. What is needed is a system which supports legacy expansion bus devices, such as PCI expansion cards, even in those cases where the devices must run their own respective BIOS routines in order to be initialized. The present invention provides a novel solution to these requirements.
SUMMARY OF THE INVENTION
The present invention provides a system that maintains IBM PC compatibility and yet provides the benefits of an advanced firmware architecture. The system of the present invention is able to boot using advanced firmware architecture and yet retains compatibility with legacy hardware and legacy software. The system of the present invention provides the advances of a modern firmware architecture and the associated programming interfaces while preserving the ability to accommodate the legacy hardware devices and run legacy software applications. The present invention provides both a method and a system able to run both modern applications and legacy applications efficiently and quickly, with a minimum amount of processing overhead. In addition, the present invention supports legacy software/hardware without requiring the duplication of the IBM PC hardware. The present invention provides a system that supports legacy expansion bus devices, such as PCI expansion cards, even in cases where the devices must run their own respective BIOS routines in order to operate.
In one embodiment, the present invention is implemented as an ×86 based computer system which incorporates an advanced firmware that implements a boot process for new initializing the ×86 computer system without requiring the execution of a conventional ×86 bios or the incorporation of bios specific IBM PC hardware. The computer system includes one or more ×86 processor(s) coupled to a volatile memory (e.g., SDRAM, etc.) and a non-volatile memory (e.g., a flash memory, etc.) via one or more buses. The non-volatile memory stores the software comprising the advanced firmware of the present invention.
In this implementation, the computer system is based upon a new architecture that takes advantage of modern design techniques and design features to provide sophisticated capabilities and functions. The present invention functions in part by providing compatibility for legacy (e.g., IBM-compatible) software applications and legacy hardware devices. The advanced firmware of the present invention boots the computer system into an initial state capable of supporting both modern software applications designed to "modern" APIs provided by the advanced firmware, or legacy IBM compatible APIs in accordance with an IBM-compatible computer system.
Upon a system reset, or upon initial power up, the computer system of the present invention begins executing the instructions of the advanced firmware. These instructions cause the computer system to initialize its associated device drivers and internal hardware, thereby "booting" the computer system. The advanced firmware initializes device drivers for the computer system, thereby making available the capabilities of the coupled devices (e.g., initializing mass storage devices such as a hard drive). The advanced firmware then initializes its APIs for supporting "modern" software programs.
The advanced firmware also initializes a "virtual compatibility machine" for supporting legacy software programs and legacy hardware devices. In one implementation, the virtual compatibility machine is a software based model instantiated by the modern firmware in volatile memory. The virtual compatibility machine includes a plurality of compatibility models which function by modeling aspects of an IBM PC compatible API. The compatibility models emulate corresponding aspects of an IBM PC compatible machine which are accessed by legacy software applications or legacy hardware devices during their operation. The compatibility models provide the IBM-compatible type interfaces expected by the legacy software programs or legacy hardware devices.
The advanced firmware also executes a portion of a IBM compatible BIOS in order to create a memory footprint required to support certain accesses of IBM compatible software/hardware. The software/hardware interacts with this memory footprint transparently, as if interfacing with an actual IBM compatible machine. The virtual compatibility machine translates functions, calls, accesses, etc., by legacy software programs/hardware devices to the compatibility models into corresponding functions performed by the device drivers and hardware of the computer system. Together, the virtual compatibility machine and the memory footprint provide the required environment for supporting legacy software applications/hardware devices.
Specifically, to support legacy expansion bus devices that include their own respective BIOS extensions, the present invention runs the expansion device BIOS extensions in much the same manner as the IBM compatible BIOS portion. This allows these expansion card devices to initialize, configure, and operate by establishing their particular areas, interfaces, buffers, etc., within the memory footprint. Once the expansion device BIOS extensions have been executed, the memory foot print has been updated in accordance with the requirements of the particular expansion device, and the computer system is now ready to support the relevant expansion devices.
In so doing, the system of the present invention provides the advances of a modern firmware, its associated programming interfaces, and a new modern architecture of the computer system itself, while preserving the ability to accommodate the legacy hardware devices and run legacy software applications. Modern software programs can access the advanced capabilities of the computer system by directly accessing the APIs of the modern firmware. Legacy software programs/hardware devices are supported with a minimum of processing overhead without requiring the expensive duplication of older, outdated IBM compatible hardware and BIOS software. This makes the computer system much faster and much more reliable.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention is illustrated by way of example and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
FIG. 1 shows a diagram of advanced architecture ×86 computer system in accordance with the present invention.
FIG. 2 shows a diagram of an advanced firmware boot sequence in accordance with one embodiment of the present invention.
FIG. 3 shows a flow chart of the steps of the firmware initialization process of the present invention.
FIG. 4 shows a flow chart of the steps of the VCM initialization process in accordance with one embodiment of the present invention.
FIG. 5 shows a flow chart of the steps of a process of executing the 16-bit bios sub portion and handling exceptions generated therefrom in accordance with the present invention.
FIG. 6 shows a flow chart of the steps of the process of finishing the creation of a 640K memory image and passing controlled with subsequent application in accordance with the present invention.
FIG. 7A shows a diagram of an advanced architecture ×86 computer system accordance with an alternative embodiment of the present invention.
FIG. 7B shows a table of the values of a specific register used for providing services to PCI expansion devices in accordance with one embodiment of the present invention.
FIG. 8 shows a flow chart of a first version of a PCI bus discovery process in accordance with one embodiment of present invention.
FIG. 9 shows a flow chart of a second version of a PCI bus discovery process in accordance with one embodiment of present invention.
FIG. 10 shows a flow chart of the overall combined process used by one embodiment of the present invention to perform PCI bus discovery.
FIG. 11 shows a table describing the interrupt usage of a computer system in accordance with one embodiment of the present invention.
FIG. 12A shows a first table describing the I/O port usage of a computer system in accordance with one embodiment of the present invention.
FIG. 12B shows a second table describing the I/O port usage of a computer system in accordance with one embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
In the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be obvious to one skilled in the art that the present invention may be practiced without these specific details. In other instances well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing, and other symbolic representations of operations on data bits within a computer system. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. A procedure, logic block, process, step, etc., is here, and generally, conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, optical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as "transferring" or "reading" or "processing" or "executing" or "storing" or "shadowing" or "buffering" or the like, refer to the action and processes of a computer system (e.g.,computer system 100 shown in FIG. 1), or similar data processing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention provides a system that maintains IBM PC compatibility and yet provides the benefits of an advanced firmware architecture. The system of the present invention is able to boot using advanced firmware architecture and yet retains compatibility with legacy hardware and legacy software. The system of the present invention provides the advances of a modern firmware architecture and the associated programming interfaces while preserving the ability to accommodate the legacy hardware devices and run legacy software applications. The present invention provides both a method and a system able to run both modern applications and legacy applications efficiently and quickly, with a minimum amount of processing overhead. In addition, of the present invention supports legacy software/hardware without requiring the duplication of the IBM PC API hardware/BIOS. The present invention and its benefits are further described below.
Referring now to FIG. 1, a block diagram of anexemplary computer system 100 upon which the present invention may be practiced is shown. Thecomputer system 100 includes one or more host processors 101-104 which are used to run software applications. The host processors 101-104 execute ×86 based instructions. Some examples include the Pentium, Pentium II, K6, etc. microprocessors manufactured by companies such as Intel, Advanced Micro Devices, Integrated Device Technologies, National Semiconductor, etc. These microprocessors 101-104 process ×86 applications and run DOS, Windows, Windows NT, etc. operating systems. However, unlike previous PC's, the currently preferred embodiment of the present invention does not utilize a basic input/output system (BIOS). Instead, an advanced firmware is used to boot the system upon power up or reset. The advanced firmware of the present invention is stored in aflash memory 110. Also included inflash memory 110 is the VCM and a portion of 16-bit BIOS code. The significance, functions, and mechanics associated with the firmware, VCM, and 16-bit BIOS code are each described in greater detail below.
Coupled to microprocessors 101-104 is an application specific integrated circuit chip (ASIC) 105.ASIC 105 performs most of the functions which are not handled by the host processors 101-104. For example,ASIC 105 performs the functions of a central processing unit (CPU) interface, memory controller, image processor, digital signal processor, graphics rendering engine, data compression/expansion device (JPEG and MPEG), translation hardware, buffers, FIFOs, etc. Coupled toASIC 105 is agraphics subsystem 105 which is used for accelerated 3-D graphics rendering. One example is the OpenGL pipeline architecture developed by Silicon Graphics Inc. Images are displayed on a CRT orflat panel display 107. In the currently preferred embodiment, a singleunified memory 108 is coupled toASIC 105.Memory 108 consists of dynamic random access memory (DRAM) which is dynamically allocated to function as a main memory, graphics (e.g., texture) memory, image processing (e.g., frame buffer memory), etc. A unified memory architecture is described in great detail in the patent application entitled, "A Unified Memory Computer Architecture With Dynamic Graphics Memory Allocation," filed Sep. 13, 1996, Ser. No. 08/713,779 and which is incorporated by reference in its entirety herein. An input/output (I/O)chip 109 is coupled toASIC 105. I/O chip 109 provides the appropriate interface with internal and/or external devices, such as the universal serial bus (USB), small computer system interface (SCSI),IEEE 1394, video (CCJR 601), etc. With the present invention, the ×86 microprocessors run CISC whereas other parts of the computer system may run RISC or other formats. For example, microprocessors 101-104 run CISC; while at the same time,ASIC 105 runs RISC. It should be noted that this block diagram is shown as an example of one of the many different types of computer architectures which the present invention now enables computer vendors to design. The present invention applies to all of the various new designs as well as to work stations, laptops, minicomputers, and even mainframes.
With reference now to FIG. 2, a diagram 200 of an advanced firmware boot sequence in accordance with one implementation of the present invention is shown. As depicted in diagram 200, the boot sequence of the present invention begins inblock 201 where a power up of the computer system (e.g., computer system 100), a "system reset" by the user, or some other event otherwise initiates the boot sequence. As is well known, upon an initial power up or system reset,computer system 100 initializes its basic functions and its basic hardware devices (e.g., USB devices, SCSI devices, 1394 devices, etc.). This is shown inblock 202, where the advanced firmware of the present invention initializesdevice drivers 205 through 207, and any other device drivers for any other coupled devices. This is graphically depicted byline 204.
Once the device drivers ofcomputer system 100 are initialized (e.g.,device drivers 205 through 207), the advanced firmware the present invention initializes APIs for accessing the device drivers and other internal hardware ofcomputer system 100. In accordance with the present invention, the firmware provides modern APIs using modern software design techniques for accessing devices coupled tocomputer system 100. The APIs presented by the firmware are standardized and documented. For example, advanced firmware compliant software applications access the coupled devices by using appropriate calls to the firmware APIs as opposed to accessing the hardware directly. Once the device drivers are initialized and their respective APIs are initialized, other software can be retrieved from mass storage devices coupled to the computer system (e.g., a SCSI hard drive) and executed to continue to boot process.
Upon completion of the initial boot sequence inblock 201 and completion of firmware initialization inblock 202,computer system 100 is capable of running advanced firmware compliant software applications. Device drivers forcomputer system 100 are initialized and their associated APIs are in place. At this point in the boot sequence,computer system 100 is capable of supporting advanced firmware compliant applications. For example,computer system 100 would be capable of supporting a UNIX-based operating system, wherein the initialization software for the operating system is fetched from the SCSI mass storage device (e.g., a SCSI hard drive) and executed, in order to, for example, further initializememory 108 with any required data structures, and display appropriate user interface information viagraphics 106. Upon completion of firmware initialization inblock 202, the advanced firmware boot process the present invention next proceeds to VCM initialization inblock 203.
To provide support for legacy software applications and legacy hardware applications, the advanced firmware boot sequence of the present invention proceeds to block 203 for initialization of a virtual compatibility machine. Initializing the virtual compatibility machine involves a number of steps and processes. For clarity, these steps and processes are grouped together in the region labeled 220.
Inblock 203, the advanced firmware the present invention initializes a virtual compatibility machine (e.g., VCM). In accordance with the present invention, the VCM functions in part by providing support for legacy software programs and legacy hardware devices. To initialize the virtual compatibility machine, the advanced firmware placescomputer system 100 into "virtual ×86" mode by changing modes of the one or more ×86 microprocessors (e.g.,microprocessors 101 through 104) from "real mode" to "virtual ×86" mode. This allows the advanced firmware to protect its software data structures and memory and designate certain memory locations as "privileged" while proceeding with the virtual compatibility machine initialization process (e.g., the steps and processes within region 220). To begin to VCM initialization process, the VCM is instantiated withinmemory 108 inblock 230. The entry into virtual ×86 mode is graphically depicted byline 210 as it crosses fromblock 203 and intoregion 220.
In accordance with the present invention,VCM 230 is a software based abstraction of certain portions of the physical hardware (e.g., memory locations, registers, etc.) of an IBM-compatible PC. In accordance with the present embodiment, the virtual compatibility machine is a software based model which abstracts the functions, features, and characteristics of certain portions of the IBM-compatible API. The virtual compatibility machine includes a series of models corresponding to the specific functional aspects of the IBM-compatible API. FIG. 2 depicts thecompatibility models 231 through 233, specifically, the interruptcompatibility model 231, the PCAT compatibility model 232, and the disksubsystem compatibility model 233. These compatibility models are software based models of the IBM-compatible API. For example, interruptcompatibility model 231 is a software based emulation of the interrupt registers, I/O addresses, etc. of the interrupt hardware of the IBM-compatible API. PCAT compatibility model 232 provides a similar software based emulation of the specific memory locations and input output registers utilized for specific input output functions of the IBM-compatible API (e.g., keyboard access registers, parallel port registers, serial port registers, and the like). Similarly, disksubsystem compatibility model 233 provides a software based emulation of the specific memory locations, registers, addresses, etc., of the disk subsystem of the IBM-compatible API.
Compatibility models 231 through 233 are used byVCM 230 to keep track of the state of the "emulated IBM PC". As described above,computer system 100 does not include the hardware dictated by the IBM-compatible API. Assuch computer system 100 does not include the physical memory locations, registers, etc. dictated by the IBM-compatible API and expected by IBM-compatible software applications. Instead,VCM 230 in accordance with the present invention emulates these memory locations, registers, etc. by keeping track of their state as they are manipulated/accessed the IBM-compatible software applications. Thus,VCM 230 usescompatibility models 231 through 233 to maintain a state of an IBM-compatible computer system as ifcompatibility models 231 through 233 were real physical hardware.
In addition to initializing aVCM 230, the advanced firmware of the present invention also executes a sub portion of a IBM-compatible 16-bit BIOS inblock 250. The 16-bit BIOS sub portion is a portion of the BIOS found in every IBM-compatible PC. The present invention executes this 16-bitBIOS sub portion 250 in order to create an IBM-compatible640K memory image 255. When a prior art IBM-compatible computer system executes its BIOS, the BIOS creates a "memory footprint" of specific software data structures used for specific purposes. Such purposes include for example, frame buffers, input output registers, BIOS system calls, and the like. IBM-compatible software applications and hardware devices access this memory footprint to accomplish the associated functions. Instead of recreating each of these items individually, the advanced firmware of the present invention runs the 16-bitBIOS sub portion 250 to create the640K memory image 255. Hence, when an IBM-compatible software application is running, it accesses the640K memory image 255 to accomplish its desired function
The advanced firmware of the present invention utilizes exception handling in order to execute the 16-bitBIOS sub portion 250. As depicted in FIG. 2, exception handling 240 handles the exceptions generated by running the 16-bitBIOS sub portion 250. As described above, the advanced firmware places thecomputer system 100 into virtual ×86 mode to execute the steps inregion 220. This allows the firmware to designate certain addresses in memory as privileged, thereby causing the generation of exception, or trap, when a software applications subsequently tries to access one of the privileged addresses.
In accordance with the present invention, the advanced firmware configuresmicroprocessors 101 through 104 to recognize attempts to access IBM-compatible addresses/memory locations/registers as exceptions. Thus, the 16-bit BIOS sub portion is executed directly bymicroprocessors 101 through 104. Accesses to privileged addresses generate exceptions which are handled by exception handling 240. These exceptions correspond to attempted accesses to IBM-compatible API addresses, memory locations, etc. Exception handling 240 passes these exceptions to thevirtual compatibility machine 230 where they are interpreted.
VCM 230 then determines what the attempted operation was.VCM 230 interprets the exception generated by the 16-bitBIOS sub portion 250 to determine what action the 16-bit BIOS sub portion is attempting. Once the attempted action is determined,VCM 230 then implements the attempted action via theappropriate compatibility model 231 through 233 and returns control back to the 16-bitBIOS sub portion 250 via theexception handler 240.
For example, in a case where the 16-bit BIOS sub portion attempts to read from I/O register of the IBM-compatible API (e.g., the register corresponding to the keyboard controller) this attempted access generates an exception.Exception handler 240 passes the exception to theVCM 230. TheVCM 230 determines that the 16-bit BIOS sub portion was attempting to read from an I/O register of the IBM-compatible API corresponding to, for example, the keyboard controller. TheVCM 230 reads the state of a variable within PCAT compatibility model 232 which represents the specific I/O register and returns this value to the 16-bitBIOS sub portion 250. Thus, from the perspective of the 16-bitBIOS sub portion 250, it just read the value from the real I/O register of a real IBM-compatible computer system, whereas in reality, it merely read the value of a variable in a corresponding software based compatibility model (e.g., PC AT compatibility model 232).
In a case where the 16-bit BIOS sub portion attends to access a device (e.g., a hard disk drive), the accesses also generates an exception, is passed to theVCM 230, interpreted, and translated into a corresponding access to one of the "real" device drivers (e.g.,device driver 206 for the SCSI subsystem) ofcomputer system 100 via one of thecompatibility models 231 through 233 (e.g., disk subsystem compatibility model 233).
In this manner, the 16-bit BIOS sub portion runs natively at full speed onmicroprocessors 101 through 104 ofcomputer system 100. Its execution is only interrupted when it attempts to access nonexistent hardware/memory locations/addresses, as when it intends to access specific aspects of the IBM-compatible API. Such accesses generate exceptions which are handled byexception handler 240 and interpreted by theVCM 230. The accesses are translated into equivalent functions using thecompatibility models 231 through 233.
Once the 16-bitBIOS sub portion 250 finishes its execution, the640K memory image 255 has been created and has been mapped intosystem memory 108. As described above, the640K memory image 255 provides the memory footprint portion of the IBM-compatible API. The640K memory image 255 in conjunction with the VCM 230 (and its includedcompatibility models 231 through 233) now provide the elements of the IBM-compatible API required to support IBM-compatible software and hardware. Once the640K memory image 255 and theVCM 230 and its associatedcompatibility models 231 through 233 are properly initialized (e.g., the 16-bit BIOS sub portion finishes execution),computer system 100 is ready to fully support legacy software applications and legacy hardware devices. Control of the computer system is then passed to the appropriate application (either legacy application or modern application). This is graphically depicted byline 260.
Subsequently, when legacy applications run (e.g., Windows 95) the legacy applications run natively at full speed onmicroprocessors 101 through 104. Only their accesses to privileged addresses, corresponding to specific aspects of the IBM-compatible API, are trapped and translated. Thus, the system of the present invention is much faster than any prior art, full software based emulation program.
In contrast, when modern, firmware compliant applications run, they access the functionality ofcomputer system 100 directly via the APIs presented by advanced firmware of the present invention. They access the hardware ofcomputer system 100 and the coupled devices by directly calling the respective APIs, completely bypassing the640K memory image 255 and theVCM 230. Thus, when executing modern firmware compliant applications,computer system 100 is much more stable and much more reliable then an equivalent IBM-compatible computer system incorporating all of the conventional IBM-compatible API hardware and software.
With reference now to FIG. 3, a flow chart of the steps of aprocess 300 in accordance with the present invention is shown.Process 300 shows the steps involved in performing the initiation of the boot sequence and the firmware initialization process of the present invention (e.g., blocks 201 and 202 of FIG. 2).
As depicted in FIG. 3,process 300 begins instep 301 orcomputer system 100 is initially powered up. Upon initial power up,computer system 100 begins fetching instructions for the advanced firmware fromflash memory 110. These instructions begin the firmware initialization process, as shown instep 302. Instep 303, the advanced firmware the present invention begins initializing the device drivers forcomputer system 100. As described above, the device drivers interface with their respective devices. As the device drivers are initialized, their respective devices (e.g., USB, SCSI, 1394, etc.) are made available to thecomputer system 100.
Instep 304, the firmware the present invention initializes its API functions. As described above, the firmware presents modern standardized APIs for interfacing with the hardware and functionality ofcomputer system 100. The hardware ofcomputer system 100 and the coupled devices (e.g., USB, SCSI, 1394, etc.) are accessed via their respective APIs. Once the device drivers and their associated APIs are initialized, their respective devices are available to other resources ofcomputer system 100. Thus, instep 305, the advanced firmware of the present invention is able to access a mass storage device (e.g., a coupled SCSI hard drive) via its initialized device driver and respective API, in order to for example, fetch additional instructions.
At this point, the hardware ofcomputer system 100 is available to the advanced firmware. Thus, the advanced firmware is able to query the user for any required input, as shown instep 306. For example, a menu choices can be displayed to the user viagraphics pipeline 106 and monitor 107 (since their device drivers and associated APIs have been initialized). Similarly, user input can be accepted via a USB keyboard or USB mouse. Instep 307, the advanced firmware responds to user input and performs the functions as needed using the initialized device drivers. As described above, at this point,computer system 100 is capable of supporting modern firmware compliant software applications. These applications are capable of accessing the full hardware and software functionality of computer system via the modern standardized APIs presented by the modern firmware. Subsequently, instep 308, the advanced firmware of the present invention is ready to begin VCM initialization.
Referring now to FIG. 4, a flow chart of the steps of aprocess 400 in accordance with the present invention is shown. As depicted in FIG. 4,process 400 shows the steps involved in initializing the VCM of the present invention (e.g., blocks 203, 250, and 230 through 233 of FIG. 2).
As depicted in FIG. 4,process 400 begins instep 401, where VCM initialization is begun. As described above,computer system 100 is placed into virtual ×86 mode, wherein memory addresses, I/O registers, etc. corresponding to the IBM-compatible API are designated as being privileged. Subsequent accesses to any of these locations, addresses, registers, etc. generate exceptions. Additionally, instep 402, the VCM is instantiated withinmemory 108 ofcomputer system 100. Beginning instep 403, the compatibility models comprising the VCM are each initialized. Instep 403, and interrupt compatibility model is initialized. Instep 404, a PC AT compatibility model is initialized. And instep 405, a disk subsystem compatibility model is initialized. As described above, these models are software based representations of specific aspects of the IBM-compatible API. The models are used to maintain a "state" of an emulated IBM-compatible machine, wherein instead of real physical hardware, software emulated hardware is used to interact with and except input from and provide input to legacy software applications and/or hardware.
Instep 406, the exception handling subsystem (e.g., block 240 of FIG. 2) ofcomputer system 100 is configured to trap accesses to the memory locations, addresses, registers, etc., corresponding to certain specific aspects of the IBM-compatible API. Once the exception handling subsystem is configured, legacy software applications can execute natively onprocessors 101 to 104 at full speed. Any accesses to non-existent IBM-compatible hardware, memory, registers, etc., are trapped to the VCM as described above. Subsequently, instep 407, the advanced firmware of the present invention executes a 16-bit via sub-portion to build a 640K memory image. As described above, upon completion of the 16-bit BIOS sub-portion execution, the 640K memory image will correspond to the memory image of an IBM-compatible computer system, and will thus be able to support legacy software applications/hardware.
FIG. 5 shows steps involved in aprocess 500 of executing the 16-bit BIOS sub-portion and building the 640K memory image.Steps 501 to 509 aprocess 500 implementblocks 250, 255, 240, and 230 through 233 of FIG. 2.
Process 500 begins instep 501, where execution of the 16-bit BIOS sub portion is begun. Instep 502, as described above, the instructions of the 16-bit BIOS sub portion are executed natively oncomputer system 100sub processors 101 through 104. As discussed inprocess 400 of FIG. 4, the exception handling subsystem ofcomputer system 100 is configured to trap accesses to IBM-compatible API addresses. Thus, the 16-bit BIOS sub portion runs natively, and continues to do so until in exception is generated. When the 16-bit BIOS sub portion attempts to access privileged addresses, instep 503, the relevant access is trapped and an exception is generated instep 505. Instep 506, as described above, an exception handler (e.g.,exception handling block 240 from FIG. 2) is invoked.
The particular exception handler called depends upon the particular address of the access. Instep 507, the exception is passed to the VCM for interpretation. The VCM decodes the access to determine what function the 16-bit BIOS sub portion was attempting to perform. Then, instep 508, the VCM updates the appropriate compatibility model in accordance with its interpretation of the access. As described above, the VCM updates the state of the corresponding compatibility model to reflect the access by the 16-bit BIOS sub portion. Once the state is updated, execution control is passed back to the 16-bit BIOS sub portion inblock 509, and the 16-bit BIOS sub portion continues to run natively.
In this manner, the 16-bit BIOS sub portion continues to run and continues to build the 640K memory image withinmain memory 108 ofcomputer system 100, as indicated bystep 504. The 640K memory image (e.g., block 255 of FIG. 2) corresponds to the memory footprint of an IBM-compatible computer system that results from it running its IBM PC AT BIOS. As such, the 640K memory image provides the needed support for running legacy software applications/hardware devices.
Referring now to FIG. 6, the steps of aprocess 600 of completing the boot process ofcomputer system 100 in accordance with the present invention is shown. As depicted in FIG. 6,process 600 shows the steps involved in finishing the execution of the 16-bit BIOS sub portion (e.g., completing the 640K memory image) and finishing the boot process by placingcomputer system 100 in readiness to run either modern firmware compliant applications or IBM-compatible, legacy, applications. Particularly, steps 601 through 605 depict the steps involved in finishing the execution of the 16-bit BIOS sub portion (e.g., block 250 of FIG. 2) and passing control of the computer system to a subsequent software application (e.g.,line 260 of FIG. 2).
Process 600 begins instep 601, where the execution the 16-bit BIOS sub portion is finished. Subsequently, instep 602, control ofcomputer system 100 is passed to a subsequent application. Instep 603, where the subsequent application is a modern firmware compliant application (e.g., designed to take advantage of the APIs presented by the modern firmware),process 600 proceeds to step 604, where the modern firmware compliant application runs natively on the computer systems processors. Instep 605, the modern firmware application directly accesses the device drivers of the computer system via the modern firmware's APIs. The modern firmware application enjoys access to the hardware functionality and device functionality ofcomputer system 100 via the APIs presented by the modern firmware. Instep 603, where the subsequent application is an IBM-compatible application, the application is run natively on the processors ofcomputer system 100. As described above, accesses to certain portions of the IBM-compatible API generate exceptions which are passed to the virtual compatibility machine interpreted. The accesses are translated into equivalent accesses on the device drivers ofcomputer system 100 via the appropriate compatibility model.
With reference now to FIG. 7, a diagram 700 of the advanced firmware boot sequence of the present invention in accordance with an alternative embodiment a shown. As depicted in FIG. 7, diagram 700 is substantially the same is diagram 200 of FIG. 2, except for the fact that diagram 700 includes ablock 701 wherein expansion device BIOS for expansion device is coupled tocomputer system 100 is run in the same manner as the 16-bit BIOS sub-portion 250.Bios extensions 701 includes the BIOS software for legacy hardware expansion cards coupled tocomputer system 100, wherein the legacy hardware expansion cards run their BIOS after the IBM compatible BIOS runs in order to initialize their respective memory foot print within the 640K memory image area.
In the prior art IBM compatible environment, expansion card devices (e.g., PCI bus expansion devices) run their own respective BIOS in much the same way as the BIOS of the IBM computer system in order to "hook" into the aspects of the IBM compatible API. In accordance with the present invention, in order to allow these devices to function,computer system 100 needs to run their respective BIOS and allow these expansion card devices to establish their particular areas within the640K memory image 255.
Thus, inblock 701, the expansion device BIOS extensions, for those expansion devices which incorporate their own BIOS, are run. As with the 16-bit BIOS sub-portion 250, the expansiondevice BIOS extensions 701 run natively on the processors ofcomputer system 100 and generate exceptions when attempting to access certain addresses of the IBM compatible API. As with the 16-bit BIOS sub-portion, these exceptions are passed to theVCM 230 for interpretation. They are handled in substantially the same manner as the exceptions generated by the execution of the 16-bit BIOS sub-portion.
Once the expansion device BIOS extensions have been successfully executed, the memory foot print of the640K memory image 255 has been updated in accordance with the requirements of the particular expansion device. Thecomputer system 100 is now ready to support legacy software applications and the particular legacy hardware expansion devices. The640K memory image 255 andvirtual compatibility machine 230 provided the IBM compatible environment which allows the legacy expansion device to operate.
It should be noted that in the case of PCI expansion devices, an executing PCI expansion device BIOS expects the underlying environment (e.g., the IBM compatible environment) to provide a number of services related to the PCI bus ofcomputer system 100. In most cases, the services are provided through the ×86 "int" instruction. For example in one embodiment, the expected services are accessed by calling an instruction "int1A" with the caller setting the value of a particular register (e.g., the "AL" register) in a specified manner. A table of these PCI interrupt services and their corresponding A. L. register values are shown in FIG. 7.
In addition, it should be noted that in the case of PCI expansion devices, an executing PCI expansion device BIOS can access PCI configuration address space into separate ways. The first is through the interfaces specified in the table of FIG. 7. The second is by using ×86 I/O instructions to access registers located at addresses CF8 and CFC (Hexadecimal). The advanced firmware of the present invention supports both methods.
It should also be noted that with the PCI bus,computer system 100 needs to implement a process were each possible PCI bus slot is checked to determine whether a device is present, and if so, to properly initialize and enable the device and map the devices resources so that an external software process (e.g., a device driver) can access them. This is commonly referred to as PCI bus enumeration, or PCI bus discovery. The present invention provides support for PCI bus enumeration/discovery for both IBM compatible applications and modern firmware applications. The steps of this process are discussed below.
Referring now to FIG. 8, FIG. 9, and FIG. 10, three different versions of the PCI bus discovery process in accordance with one embodiment of the present invention are shown. FIG. 8 shows aprocess 800 showing the steps of the PCI bus discovery process performed by the advanced firmware of the present invention. FIG. 9 shows a flow chart of the steps of aprocess 900 of the PCI bus discovery process as performed by the 16-bit BIOS sub-portion 540. FIG. 10 shows a flow chart of the steps of a process 1000 of the combined PCI bus discovery process of the present invention.
Referring to process 800 of FIG. 8,process 800 begins instep 801 and in steps 802 through 804,process 800 saves the device requirements for each of the devices coupled to the PCI bus. This is referred to as the query phase. In steps 805 through 806,process 800 sets the device resources for each of the devices in accordance with their saved device resource requirements. This is referred to as the allocation phase. Insteps 807 through 810,process 800 calls the device drivers port each of the discovered devices. This is referred to as the execution phase.Process 800 ends instep 811 when all registered devices have had their respective device drivers called.
Referring to process 900 FIG. 9,process 900 begins instep 901, and insteps 902 through 905,process 900 sets the device resources for each of devices coupled to the PCI bus and ends instep 904. Instep 906, in the case where a coupled PCI expansion device incorporates an expansion device BIOS extension,process 900 executessteps 906 through 909. The expansion device BIOS extension is copied to main memory and executed in the manner described above, thereby initializing the respective device.Process 900 then ends instep 904.
Referring to process 1000 of FIG. 10, process 1000 shows the combined steps of both the modern firmware PCI bus discovery process and the IBM compatible PCI bus discovery process. Process 1000 begins instep 1001. Insteps 1002 through 1004, 42 the devices coupled to the PCI bus, process 1000 performs the allocation phase and the execution phase (steps 1008 and 1009) as described in FIG. 8. Insteps 1005 through 1007, process 1000 determines whether any of the coupled expansion bus devices incorporate an expansion device BIOS extension. Instep 1005 process 1000 determines whether the expansion device BIOS extension is disabled. Instep 1006 process 1000 determines whether the expansion device BIOS extension is present. Instep 1007, the slot number for the respective expansion device is accounted for (e.g., marked).
Process 1000 proceeds tosteps 1010 through 1014, where the marked expansion devices which incorporate expansion device BIOS extensions have their respective BIOS extensions copied into main memory and executed in the manner described above. Then, insteps 1015 through 1019, the advanced firmware of present invention collects memory space no longer needed by the expansion device BIOS extensions (e.g., garbage collection, and other cleanup routines), and process 1000 and in step 1020.
In this manner, the advanced firmware of the present invention supports legacy PCI expansion devices, including those devices which require the execution of their own respective BIOS extensions in order to be properly initialized.
Thus, the present invention provides a system that maintains IBM PC compatibility and yet provides the benefits of an advanced firmware architecture. The system of the present invention is able to boot using advanced firmware architecture and yet retains compatibility with legacy hardware and legacy software. The system of the present invention provides the advances of a modern firmware architecture and the associated programming interfaces while preserving the ability to accommodate the legacy hardware devices and run legacy software applications. The present invention provides both a method and a system able to run both modern applications and legacy applications efficiently and quickly, with a minimum amount of processing overhead. In addition, of the present invention supports legacy software/hardware without requiring the duplication of the IBM-compatible API hardware/BIOS.
Referring now to FIG. 11 and FIGS. 12A and 12B, FIG. 11 shows a table 1100 depicting a plurality of interrupts used in a computer system in accordance with the present invention (e.g., computer system 100) and a brief description of their usage. FIG. 12A and FIG. 12B show a table 1201 and 1202 which depict a plurality of I/O ports used in a computer system in accordance with the present invention (e.g., computer system 100) and a brief description of their usage. Specifically, table 1201 of FIG. 12A shows I/O ports "0" through "81h" while table 1202 of FIG. 12B shows I/O ports "0A0h" through "3FCh".
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.

Claims (27)

What is claimed is:
1. An ×86 based computer system that implements a firmware based boot process without an ×86 BIOS that supports expansion devices coupled to the computer system, wherein the expansion devices include their own respective BIOS extensions, comprising:
a computer system including an ×86 processor coupled to a volatile memory and a non-volatile memory via a bus, the non-volatile memory including firmware which when executed by the processor cause the computer system to implement the steps of:
a) initializing device drivers for the computer system using the firmware;
b) initializing an application programming interface for the device drivers by using the firmware;
c) initializing a compatibility component for interfacing with the device drivers, wherein the compatibility component is operable for translating accesses by a first software application to an ×86 BIOS into corresponding accesses to the device drivers, such the first software application is able to execute on the computer system by using the compatibility component while a second software application is able to execute on the computer system by accessing the application programming interface directly; and
d) running an expansion device BIOS extension from an expansion device coupled to the computer system to initialize a memory area in volatile memory, wherein the memory area is configured by the BIOS extension to interface with the expansion device, such that the expansion device is available to the first application and the second application.
2. The system of claim 1, wherein the first software application is a legacy application adapted to execute on an ×86 BIOS based computer system and the expansion device is a legacy expansion device adapted to couple to an ×86 BIOS based computer system.
3. The system of claim 1, further including the step of performing a bus discovery process to initialize the expansion device, wherein the expansion device is coupled to the computer system via a bus, wherein the firmware determines whether the expansion device includes the BIOS extension.
4. The system of claim 1, wherein the firmware causes the computer system to further implement the step of running a portion of an ×86 BIOS to initialize the area in volatile memory, wherein the area is configured by the portion to interface with the first software application to enable it to execute.
5. The system of claim 4, wherein the area in volatile memory corresponds to a 640K memory configuration created in an ×86 BIOS based computer system when the ×86 BIOS based computer system is booted.
6. The system of claim 1, wherein the firmware causes the computer system to further implement the step of initializing an exception handler to generate exceptions when the first software program accesses the ×86 BIOS.
7. The system of claim 6, wherein the firmware causes the computer system to further implement the step of initializing the exception handler to generate exceptions when the BIOS extension accesses the ×86 BIOS.
8. The system of claim 1, wherein the majority of the software code comprising the first software application executes natively on the computer system without translation.
9. The system of claim 1, wherein the majority of the software code comprising the BIOS extension executes natively on the computer system without translation.
10. A unified memory architecture ×86 based computer system that implements a firmware based boot process without an ×86 BIOS, comprising:
a computer system including an ×86 processor coupled to a volatile memory and a non-volatile memory via a bus, the non-volatile memory including firmware which when executed by the processor cause the computer system to implement the steps of:
a) initializing software drivers for hardware of the computer system;
b) initializing an application programming interface for the hardware of the computer system;
c) running a portion of an ×86 BIOS to initialize a memory area in volatile memory, wherein the area is configured by the portion to interface with a first software application to enable the first software application to execute;
d) initializing a compatibility component for interfacing with the hardware, wherein the compatibility component is operable for translating accesses by the first software application to an ×86 BIOS into corresponding accesses to the hardware, such the first software application is able to execute on the computer system by using the compatibility component and the memory area while a second software application is able to execute on the computer system by accessing the application programming interface directly; and
e) running an expansion device BIOS extension from an expansion device coupled to the computer system to initialize a memory area in volatile memory, wherein the memory area is configured by the BIOS extension to interface with the expansion device, such that the expansion device is available to the first application and the second application.
11. The system of claim 10, wherein the first software application is a legacy application adapted to execute on an ×86 BIOS based computer system and the expansion device is a legacy expansion device adapted to couple to an ×86 BIOS based computer system.
12. The system of claim 10, further including the step of performing a bus discovery process to initialize the expansion device, wherein the expansion device is coupled to the computer system via a bus, wherein the firmware determines whether the expansion device includes the BIOS extension.
13. The system of claim 10, wherein the firmware causes the computer system to further implement the step of running a portion of an ×86 BIOS to initialize the area in volatile memory, wherein the area is configured by the portion to interface with the first software application to enable it to execute.
14. The system of claim 13, wherein the area in volatile memory corresponds to a 640K memory configuration created in an ×86 BIOS based computer system when the ×86 BIOS based computer system is booted.
15. The system of claim 10, wherein the firmware causes the computer system to further implement the step of initializing an exception handler to generate exceptions when the first software program accesses the ×86 BIOS.
16. The system of claim 15, wherein the firmware causes the computer system to further implement the step of initializing the exception handler to generate exceptions when the BIOS extension accesses the ×86 BIOS.
17. The system of claim 10, wherein the majority of the software code comprising the first software application executes natively on the computer system without translation.
18. The system of claim 10, wherein the majority of the software code comprising the BIOS extension executes natively on the computer system without translation.
19. In a computer system including an ×86 processor coupled to a volatile memory and a non-volatile memory via a bus, a firmware based boot process without an ×86 BIOS that supports expansion devices coupled to the computer system, wherein the expansion devices include their own respective BIOS extensions, the non-volatile memory storing the firmware which when executed by the processor cause the computer system to perform the steps of:
a) initializing device drivers for the computer system using the firmware;
b) initializing an application programming interface for the device drivers by using the firmware;
c) initializing a compatibility component for interfacing with the device drivers, wherein the compatibility component is operable for translating accesses by a first software application to an ×86 BIOS into corresponding accesses to the device drivers, such the first software application is able to execute on the computer system by using the compatibility component while a second software application is able to execute on the computer system by accessing the application programming interface directly; and
d) running an expansion device BIOS extension from an expansion device coupled to the computer system to initialize a memory area in volatile memory, wherein the memory area is configured by the BIOS extension to interface with the expansion device, such that the expansion device is available to the first application and the second application.
20. The process of claim 19, wherein the first software application is a legacy application adapted to execute on an ×86 BIOS based computer system and the expansion device is a legacy expansion device adapted to couple to an ×86 BIOS based computer system.
21. The process of claim 19, further including the step of performing a bus discovery process to initialize the expansion device, wherein the expansion device is coupled to the computer system via a bus, wherein the firmware determines whether the expansion device includes the BIOS extension.
22. The process of claim 19, wherein the firmware causes the computer system to further implement the step of running a portion of an ×86 BIOS to initialize the area in volatile memory, wherein the area is configured by the portion to interface with the first software application to enable it to execute.
23. The process of claim 22, wherein the area in volatile memory corresponds to a 640K memory configuration created in an ×86 BIOS based computer system when the ×86 BIOS based computer system is booted.
24. The process of claim 19, wherein the firmware causes the computer system to further implement the step of initializing an exception handler to generate exceptions when the first software program accesses the ×86 BIOS.
25. The process of claim 24, wherein the firmware causes the computer system to further implement the step of initializing the exception handler to generate exceptions when the BIOS extension accesses the ×86 BIOS.
26. The process of claim 19, wherein the majority of the software code comprising the first software application executes natively on the computer system without translation.
27. The process of claim 19, wherein the majority of the software code comprising the BIOS extension executes natively on the computer system without translation.
US09/176,6961998-10-211998-10-21Advanced boot sequence for an +86 computer system that maintains expansion card device compatibilityExpired - LifetimeUS6128731A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US09/176,696US6128731A (en)1998-10-211998-10-21Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US09/176,696US6128731A (en)1998-10-211998-10-21Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility

Publications (1)

Publication NumberPublication Date
US6128731Atrue US6128731A (en)2000-10-03

Family

ID=22645458

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US09/176,696Expired - LifetimeUS6128731A (en)1998-10-211998-10-21Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility

Country Status (1)

CountryLink
US (1)US6128731A (en)

Cited By (64)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6272453B1 (en)*1998-01-052001-08-07Trw Inc.Concurrent legacy and native code execution techniques
US6357003B1 (en)*1998-10-212002-03-12Silicon Graphics, Inc.Advanced firmware boot sequence x86 computer system that maintains legacy hardware and software compatibility
US6380633B1 (en)*2000-07-052002-04-30Siliconware Predision Industries Co., Ltd.Pattern layout structure in substrate
US20020184352A1 (en)*2001-05-172002-12-05Sunit JainFirmware common operations and reset environment
US20030046444A1 (en)*2001-09-062003-03-06International Business Machines CorporationSystem and method for configuring an application
US20030061432A1 (en)*1997-12-172003-03-27Huppenthal Jon M.Computer system architecture and memory controller for close-coupling within a hybrid processing system utilizing an adaptive processor interface port
US6560641B1 (en)*2000-03-292003-05-06Unisys CorporationSystem, method, and adapter card for remote console emulation including remote control of a peripheral device
US20030131222A1 (en)*2002-01-102003-07-10Thomas Paul AugustusControls for recursion at system startup
US6601163B1 (en)*2000-05-082003-07-29International Business Machines CorporationMethod and system for executing adapter configuration routines utilizing different operating modes
US20040098573A1 (en)*2002-11-182004-05-20Adc Telecommunication Israel Ltd.Configurable initialization of hardware
US20040199899A1 (en)*2003-04-042004-10-07Powers Richard DickertSystem and method for determining whether a mix of system components is compatible
US20050005067A1 (en)*2003-04-162005-01-06Culter Bradley G.System and method for expanding processor functionality
US20050254095A1 (en)*2004-05-102005-11-17Funai Electric Co., Ltd.Digital multifunctional imaging apparatus
US20060077413A1 (en)*2004-10-082006-04-13Sharp Laboratories Of America, Inc.Methods and systems for imaging device job management
US7058779B1 (en)*2001-03-052006-06-06Advanced Micro Devices, Inc.Computer system initialization via boot code stored in a non-volatile memory having an interface compatible with synchronous dynamic random access memory
US20070077405A1 (en)*2005-09-302007-04-05Basf CorporationInorganic/organic-filled styrenic thermoplastic door skins
US7684074B2 (en)2004-10-082010-03-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device metadata management
US7738808B2 (en)2004-10-082010-06-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device concurrent account use with remote authorization
US7826081B2 (en)2004-10-082010-11-02Sharp Laboratories Of America, Inc.Methods and systems for receiving localized display elements at an imaging device
US7870185B2 (en)2004-10-082011-01-11Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification administration
US7873553B2 (en)2004-10-082011-01-18Sharp Laboratories Of America, Inc.Methods and systems for authorizing imaging device concurrent account use
US7873718B2 (en)2004-10-082011-01-18Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting server recovery
US7920101B2 (en)2004-10-082011-04-05Sharp Laboratories Of America, Inc.Methods and systems for imaging device display standardization
US7934217B2 (en)2004-10-082011-04-26Sharp Laboratories Of America, Inc.Methods and systems for providing remote file structure access to an imaging device
US7941743B2 (en)2004-10-082011-05-10Sharp Laboratories Of America, Inc.Methods and systems for imaging device form field management
US7966396B2 (en)2004-10-082011-06-21Sharp Laboratories Of America, Inc.Methods and systems for administrating imaging device event notification
US7969596B2 (en)2004-10-082011-06-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device document translation
US7970813B2 (en)2004-10-082011-06-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification administration and subscription
US7978618B2 (en)2004-10-082011-07-12Sharp Laboratories Of America, Inc.Methods and systems for user interface customization
US8001183B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device related event notification
US8001587B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential management
US8001586B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential management and authentication
US8006293B2 (en)2004-10-082011-08-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential acceptance
US8006292B2 (en)2004-10-082011-08-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential submission and consolidation
US8015234B2 (en)2004-10-082011-09-06Sharp Laboratories Of America, Inc.Methods and systems for administering imaging device notification access control
US8018610B2 (en)*2004-10-082011-09-13Sharp Laboratories Of America, Inc.Methods and systems for imaging device remote application interaction
US8024792B2 (en)2004-10-082011-09-20Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential submission
US8023130B2 (en)2004-10-082011-09-20Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting data maintenance
US8032608B2 (en)2004-10-082011-10-04Sharp Laboratories Of America, Inc.Methods and systems for imaging device notification access control
US8032579B2 (en)2004-10-082011-10-04Sharp Laboratories Of America, Inc.Methods and systems for obtaining imaging device notification access control
US8035831B2 (en)2004-10-082011-10-11Sharp Laboratories Of America, Inc.Methods and systems for imaging device remote form management
US8051140B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for imaging device control
US8049677B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for imaging device display element localization
US8051125B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for obtaining imaging device event notification subscription
US8060930B2 (en)2004-10-082011-11-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential receipt and authentication
US8060921B2 (en)2004-10-082011-11-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential authentication and communication
US8065384B2 (en)2004-10-082011-11-22Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification subscription
US8115947B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for providing remote, descriptor-related data to an imaging device
US8115945B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for imaging device job configuration management
US8115944B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for local configuration-based imaging device accounting
US8115946B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and sytems for imaging device job definition
US8120798B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for providing access to remote, descriptor-related data at an imaging device
US8120799B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for accessing remote, descriptor-related data at an imaging device
US8120793B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for displaying content on an imaging device
US8120797B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for transmitting content to an imaging device
US8125666B2 (en)2004-10-082012-02-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device document management
US8156424B2 (en)2004-10-082012-04-10Sharp Laboratories Of America, Inc.Methods and systems for imaging device dynamic document creation and organization
US8171404B2 (en)2004-10-082012-05-01Sharp Laboratories Of America, Inc.Methods and systems for disassembly and reassembly of examination documents
US8213034B2 (en)2004-10-082012-07-03Sharp Laboratories Of America, Inc.Methods and systems for providing remote file structure access on an imaging device
US8230328B2 (en)2004-10-082012-07-24Sharp Laboratories Of America, Inc.Methods and systems for distributing localized display elements to an imaging device
US8237946B2 (en)2004-10-082012-08-07Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting server redundancy
US8345272B2 (en)2006-09-282013-01-01Sharp Laboratories Of America, Inc.Methods and systems for third-party control of remote imaging jobs
US8384925B2 (en)2004-10-082013-02-26Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting data management
US8428484B2 (en)2005-03-042013-04-23Sharp Laboratories Of America, Inc.Methods and systems for peripheral accounting

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5689726A (en)*1995-05-031997-11-18United Microelectronics CorporationComputer system interface adapter capable of automatic self-configuration and self-diagnosis before operating system initiation
US5694582A (en)*1996-01-261997-12-02Dell Usa, LpOperation system independent polled interface for extension BIOS (XBIOS) operations
US5758081A (en)*1995-12-081998-05-26Aytac; Haluk M.Computing and communications transmitting, receiving system, with a push button interface, that is continously on, that pairs up with a personal computer and carries out mainly communications related routine tasks
US5854913A (en)*1995-06-071998-12-29International Business Machines CorporationMicroprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures
US5887164A (en)*1997-06-061999-03-23National Instruments CorporationSystem and method for enabling a target computer to use storage resources of a host computer
US5905888A (en)*1997-02-191999-05-18On Spec Electronic, Inc.Bootable redundant hard disk attached to a PC's parallel port with rom-address auto-detect and configure during BIOS scan
US5913058A (en)*1997-09-301999-06-15Compaq Computer Corp.System and method for using a real mode bios interface to read physical disk sectors after the operating system has loaded and before the operating system device drivers have loaded
US5915106A (en)*1997-03-201999-06-22Ricoh Company, Ltd.Method and system for operating a scanner which emulates a disk drive
US6032247A (en)*1996-03-182000-02-29Advanced Micro Devices, Incs.Central processing unit including APX and DSP cores which receives and processes APX and DSP instructions

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5689726A (en)*1995-05-031997-11-18United Microelectronics CorporationComputer system interface adapter capable of automatic self-configuration and self-diagnosis before operating system initiation
US5854913A (en)*1995-06-071998-12-29International Business Machines CorporationMicroprocessor with an architecture mode control capable of supporting extensions of two distinct instruction-set architectures
US5758081A (en)*1995-12-081998-05-26Aytac; Haluk M.Computing and communications transmitting, receiving system, with a push button interface, that is continously on, that pairs up with a personal computer and carries out mainly communications related routine tasks
US5694582A (en)*1996-01-261997-12-02Dell Usa, LpOperation system independent polled interface for extension BIOS (XBIOS) operations
US6032247A (en)*1996-03-182000-02-29Advanced Micro Devices, Incs.Central processing unit including APX and DSP cores which receives and processes APX and DSP instructions
US5905888A (en)*1997-02-191999-05-18On Spec Electronic, Inc.Bootable redundant hard disk attached to a PC's parallel port with rom-address auto-detect and configure during BIOS scan
US5915106A (en)*1997-03-201999-06-22Ricoh Company, Ltd.Method and system for operating a scanner which emulates a disk drive
US5887164A (en)*1997-06-061999-03-23National Instruments CorporationSystem and method for enabling a target computer to use storage resources of a host computer
US5913058A (en)*1997-09-301999-06-15Compaq Computer Corp.System and method for using a real mode bios interface to read physical disk sectors after the operating system has loaded and before the operating system device drivers have loaded

Cited By (75)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7003593B2 (en)1997-12-172006-02-21Src Computers, Inc.Computer system architecture and memory controller for close-coupling within a hybrid processing system utilizing an adaptive processor interface port
US20030061432A1 (en)*1997-12-172003-03-27Huppenthal Jon M.Computer system architecture and memory controller for close-coupling within a hybrid processing system utilizing an adaptive processor interface port
US6272453B1 (en)*1998-01-052001-08-07Trw Inc.Concurrent legacy and native code execution techniques
US6357003B1 (en)*1998-10-212002-03-12Silicon Graphics, Inc.Advanced firmware boot sequence x86 computer system that maintains legacy hardware and software compatibility
US6560641B1 (en)*2000-03-292003-05-06Unisys CorporationSystem, method, and adapter card for remote console emulation including remote control of a peripheral device
US6601163B1 (en)*2000-05-082003-07-29International Business Machines CorporationMethod and system for executing adapter configuration routines utilizing different operating modes
US6380633B1 (en)*2000-07-052002-04-30Siliconware Predision Industries Co., Ltd.Pattern layout structure in substrate
US7058779B1 (en)*2001-03-052006-06-06Advanced Micro Devices, Inc.Computer system initialization via boot code stored in a non-volatile memory having an interface compatible with synchronous dynamic random access memory
US20020184352A1 (en)*2001-05-172002-12-05Sunit JainFirmware common operations and reset environment
WO2002093372A3 (en)*2001-05-172003-11-27Sun Microsystems IncA firmware common operations and reset environment
US7228537B2 (en)2001-09-062007-06-05International Business Machines CorporationSystem and method for configuring an application
US20030046444A1 (en)*2001-09-062003-03-06International Business Machines CorporationSystem and method for configuring an application
US20030131222A1 (en)*2002-01-102003-07-10Thomas Paul AugustusControls for recursion at system startup
US6944756B2 (en)2002-01-102005-09-13Sun Microsystems, Inc.Controls for recursion at system startup
WO2004040413A3 (en)*2002-10-292004-08-19Src Computers IncMemory controller with adaptive processor interface port
US20040098573A1 (en)*2002-11-182004-05-20Adc Telecommunication Israel Ltd.Configurable initialization of hardware
US20040199899A1 (en)*2003-04-042004-10-07Powers Richard DickertSystem and method for determining whether a mix of system components is compatible
US20050005067A1 (en)*2003-04-162005-01-06Culter Bradley G.System and method for expanding processor functionality
US7146488B2 (en)*2003-04-162006-12-05Hewlett-Packard Development Company, L.P.System and method for expanding processor functionality
US20050254095A1 (en)*2004-05-102005-11-17Funai Electric Co., Ltd.Digital multifunctional imaging apparatus
US8001183B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device related event notification
US8032579B2 (en)2004-10-082011-10-04Sharp Laboratories Of America, Inc.Methods and systems for obtaining imaging device notification access control
US7633644B2 (en)2004-10-082009-12-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device job management
US7684074B2 (en)2004-10-082010-03-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device metadata management
US7738808B2 (en)2004-10-082010-06-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device concurrent account use with remote authorization
US7826081B2 (en)2004-10-082010-11-02Sharp Laboratories Of America, Inc.Methods and systems for receiving localized display elements at an imaging device
US7870185B2 (en)2004-10-082011-01-11Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification administration
US7873553B2 (en)2004-10-082011-01-18Sharp Laboratories Of America, Inc.Methods and systems for authorizing imaging device concurrent account use
US7873718B2 (en)2004-10-082011-01-18Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting server recovery
US7920101B2 (en)2004-10-082011-04-05Sharp Laboratories Of America, Inc.Methods and systems for imaging device display standardization
US7934217B2 (en)2004-10-082011-04-26Sharp Laboratories Of America, Inc.Methods and systems for providing remote file structure access to an imaging device
US7941743B2 (en)2004-10-082011-05-10Sharp Laboratories Of America, Inc.Methods and systems for imaging device form field management
US7966396B2 (en)2004-10-082011-06-21Sharp Laboratories Of America, Inc.Methods and systems for administrating imaging device event notification
US7969596B2 (en)2004-10-082011-06-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device document translation
US7970813B2 (en)2004-10-082011-06-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification administration and subscription
US7978618B2 (en)2004-10-082011-07-12Sharp Laboratories Of America, Inc.Methods and systems for user interface customization
US20060077413A1 (en)*2004-10-082006-04-13Sharp Laboratories Of America, Inc.Methods and systems for imaging device job management
US8001587B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential management
US8001586B2 (en)2004-10-082011-08-16Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential management and authentication
US8006293B2 (en)2004-10-082011-08-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential acceptance
US8006176B2 (en)2004-10-082011-08-23Sharp Laboratories Of America, Inc.Methods and systems for imaging-device-based form field management
US8006292B2 (en)2004-10-082011-08-23Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential submission and consolidation
US8015234B2 (en)2004-10-082011-09-06Sharp Laboratories Of America, Inc.Methods and systems for administering imaging device notification access control
US8018610B2 (en)*2004-10-082011-09-13Sharp Laboratories Of America, Inc.Methods and systems for imaging device remote application interaction
US8024792B2 (en)2004-10-082011-09-20Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential submission
US8023130B2 (en)2004-10-082011-09-20Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting data maintenance
US8032608B2 (en)2004-10-082011-10-04Sharp Laboratories Of America, Inc.Methods and systems for imaging device notification access control
US8384925B2 (en)2004-10-082013-02-26Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting data management
US8035831B2 (en)2004-10-082011-10-11Sharp Laboratories Of America, Inc.Methods and systems for imaging device remote form management
US8051140B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for imaging device control
US8049677B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for imaging device display element localization
US8051125B2 (en)2004-10-082011-11-01Sharp Laboratories Of America, Inc.Methods and systems for obtaining imaging device event notification subscription
US8060930B2 (en)2004-10-082011-11-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential receipt and authentication
US8060921B2 (en)2004-10-082011-11-15Sharp Laboratories Of America, Inc.Methods and systems for imaging device credential authentication and communication
US8065384B2 (en)2004-10-082011-11-22Sharp Laboratories Of America, Inc.Methods and systems for imaging device event notification subscription
US8106922B2 (en)2004-10-082012-01-31Sharp Laboratories Of America, Inc.Methods and systems for imaging device data display
US8115947B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for providing remote, descriptor-related data to an imaging device
US8115945B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for imaging device job configuration management
US8115944B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and systems for local configuration-based imaging device accounting
US8115946B2 (en)2004-10-082012-02-14Sharp Laboratories Of America, Inc.Methods and sytems for imaging device job definition
US8120798B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for providing access to remote, descriptor-related data at an imaging device
US8120799B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for accessing remote, descriptor-related data at an imaging device
US8120793B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for displaying content on an imaging device
US8120797B2 (en)2004-10-082012-02-21Sharp Laboratories Of America, Inc.Methods and systems for transmitting content to an imaging device
US8125666B2 (en)2004-10-082012-02-28Sharp Laboratories Of America, Inc.Methods and systems for imaging device document management
US8156424B2 (en)2004-10-082012-04-10Sharp Laboratories Of America, Inc.Methods and systems for imaging device dynamic document creation and organization
US8171404B2 (en)2004-10-082012-05-01Sharp Laboratories Of America, Inc.Methods and systems for disassembly and reassembly of examination documents
US8201077B2 (en)2004-10-082012-06-12Sharp Laboratories Of America, Inc.Methods and systems for imaging device form generation and form field data management
US8213034B2 (en)2004-10-082012-07-03Sharp Laboratories Of America, Inc.Methods and systems for providing remote file structure access on an imaging device
US8230328B2 (en)2004-10-082012-07-24Sharp Laboratories Of America, Inc.Methods and systems for distributing localized display elements to an imaging device
US8237946B2 (en)2004-10-082012-08-07Sharp Laboratories Of America, Inc.Methods and systems for imaging device accounting server redundancy
US8270003B2 (en)2004-10-082012-09-18Sharp Laboratories Of America, Inc.Methods and systems for integrating imaging device display content
US8428484B2 (en)2005-03-042013-04-23Sharp Laboratories Of America, Inc.Methods and systems for peripheral accounting
US20070077405A1 (en)*2005-09-302007-04-05Basf CorporationInorganic/organic-filled styrenic thermoplastic door skins
US8345272B2 (en)2006-09-282013-01-01Sharp Laboratories Of America, Inc.Methods and systems for third-party control of remote imaging jobs

Similar Documents

PublicationPublication DateTitle
US6128731A (en)Advanced boot sequence for an +86 computer system that maintains expansion card device compatibility
US6357003B1 (en)Advanced firmware boot sequence x86 computer system that maintains legacy hardware and software compatibility
EP0817096B1 (en)Integrated circuit
US5701476A (en)Method and apparatus for dynamically loading a driver routine in a computer memory
US7934209B2 (en)Method for firmware variable storage with eager compression, fail-safe extraction and restart time compression scan
EP1209564B1 (en)Kernel emulator for non-native program modules
US7134007B2 (en)Method for sharing firmware across heterogeneous processor architectures
CN102369510B (en) Load the operating system using memory segmentation and ACPI-based context switching
AU2005232324B2 (en)Systems and methods for virtualizing graphics subsystems
CN1258702C (en)Method for communication between firmware written for different instruction set architectures
US5291585A (en)Computer system having system feature extension software containing a self-describing feature table for accessing I/O devices according to machine-independent format
US7260702B2 (en)Systems and methods for running a legacy 32-bit x86 virtual machine on a 64-bit x86 processor
US7181610B2 (en)Method and system to encapsulate a driver written for an operating system (OS) runtime environment in an OS independent environment firmware extension
US7284083B2 (en)Dynamically configuring resources for cycle translation in a computer system
US6170048B1 (en)PC circuits, systems and methods
US6421776B1 (en)Data processor having BIOS packing compression/decompression architecture
US20030110369A1 (en)Firmware extensions
US20060026339A1 (en)Providing block data access for an operating system using solid-state memory
US20090265708A1 (en)Information Processing Apparatus and Method of Controlling Information Processing Apparatus
CN1398372A (en) Computer System Including a Memory Access Controller Using Non-System Memory Storage Resources During System Bootstrap
US6961848B2 (en)System and method for supporting legacy operating system booting in a legacy-free system
US6199159B1 (en)Booting an operating system
US20110016463A1 (en)Computer-hardware, life-extension apparatus and method
US7581037B2 (en)Effecting a processor operating mode change to execute device code
US7640553B2 (en)Mechanisms to support use of software running on platform hardware employing different endianness

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SILICON GRAPHICS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZARRIN, SAEED S.;SULLY, JOHN;BROWN, DANIEL;AND OTHERS;REEL/FRAME:009649/0778;SIGNING DATES FROM 19981124 TO 19981125

STCFInformation on status: patent grant

Free format text:PATENTED CASE

CCCertificate of correction
ASAssignment

Owner name:FOOTHILL CAPITAL CORPORATION, CALIFORNIA

Free format text:SECURITY AGREEMENT;ASSIGNOR:SILICON GRAPHICS, INC.;REEL/FRAME:012428/0236

Effective date:20011109

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:U.S. BANK NATIONAL ASSOCIATION, AS TRUSTEE, CALIFO

Free format text:SECURITY INTEREST;ASSIGNOR:SILICON GRAPHICS, INC.;REEL/FRAME:014805/0855

Effective date:20031223

FPAYFee payment

Year of fee payment:4

ASAssignment

Owner name:GENERAL ELECTRIC CAPITAL CORPORATION,CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:SILICON GRAPHICS, INC.;REEL/FRAME:018545/0777

Effective date:20061017

Owner name:GENERAL ELECTRIC CAPITAL CORPORATION, CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:SILICON GRAPHICS, INC.;REEL/FRAME:018545/0777

Effective date:20061017

ASAssignment

Owner name:MORGAN STANLEY & CO., INCORPORATED, NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL ELECTRIC CAPITAL CORPORATION;REEL/FRAME:019995/0895

Effective date:20070926

Owner name:MORGAN STANLEY & CO., INCORPORATED,NEW YORK

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GENERAL ELECTRIC CAPITAL CORPORATION;REEL/FRAME:019995/0895

Effective date:20070926

FPAYFee payment

Year of fee payment:8

ASAssignment

Owner name:SILICON GRAPHICS INTERNATIONAL, CORP., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SILICON GRAPHICS, INC. ET AL.;SGI INTERNATIONAL, INC.;SIGNING DATES FROM 20090508 TO 20120208;REEL/FRAME:027727/0020

FPAYFee payment

Year of fee payment:12

ASAssignment

Owner name:SILICON GRAPHICS INTERNATIONAL CORP., CALIFORNIA

Free format text:MERGER;ASSIGNOR:SGI INTERNATIONAL, INC.;REEL/FRAME:034804/0437

Effective date:20120808

Owner name:SILICON GRAPHICS INTERNATIONAL, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON GRAPHICS, INC.;REEL/FRAME:034804/0446

Effective date:20090508

Owner name:SGI INTERNATIONAL, INC., CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:SILICON GRAPHICS INTERNATIONAL, INC.;REEL/FRAME:034804/0661

Effective date:20090513

ASAssignment

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:SILICON GRAPHICS INTERNATIONAL CORP.;REEL/FRAME:035200/0722

Effective date:20150127

ASAssignment

Owner name:SILICON GRAPHICS, INC., CALIFORNIA

Free format text:ORDER...AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, ENCUMBRANCES, AND INTERESTS;ASSIGNOR:FOOTHILL CAPITAL CORPORATION;REEL/FRAME:039474/0606

Effective date:20090430

Owner name:SILICON GRAPHICS, INC., CALIFORNIA

Free format text:ORDER...AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, ENCUMBRANCES, AND INTERESTS;ASSIGNOR:MORGAN STANLEY & CO., INCORPORATED;REEL/FRAME:039482/0015

Effective date:20090508

ASAssignment

Owner name:SILICON GRAPHICS, INC, CALIFORNIA

Free format text:ORDER. . .AUTHORIZING THE SALE OF ALL OR SUBSTANTIALLY ALL OF THE ASSETS OF THE DEBTORS FREE AND CLEAR OF ALL LIENS, CLAIMS, ENCUMBRANCES, AND INTERESTS;ASSIGNOR:U.S. BANK NATIONAL ASSOCIATION, AS TRUSTEE;REEL/FRAME:039484/0869

Effective date:20090430

ASAssignment

Owner name:SILICON GRAPHICS INTERNATIONAL CORP., CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS AGENT;REEL/FRAME:040545/0362

Effective date:20161101

ASAssignment

Owner name:HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SILICON GRAPHICS INTERNATIONAL CORP.;REEL/FRAME:044128/0149

Effective date:20170501


[8]ページ先頭

©2009-2025 Movatter.jp